{"id":"https://openalex.org/W2891683321","doi":"https://doi.org/10.1109/netsoft.2018.8460116","title":"Evaluating Path Query Mechanisms as a Foundation for SDN Network Control","display_name":"Evaluating Path Query Mechanisms as a Foundation for SDN Network Control","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2891683321","doi":"https://doi.org/10.1109/netsoft.2018.8460116","mag":"2891683321"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft.2018.8460116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8460116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073744273","display_name":"Sidan Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sidan Gao","raw_affiliation_strings":["NCSU Computer Science"],"affiliations":[{"raw_affiliation_string":"NCSU Computer Science","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052720802","display_name":"Shalki Shrivastava","orcid":"https://orcid.org/0000-0001-9337-8464"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shalki Shrivastava","raw_affiliation_strings":["NCSU Computer Science"],"affiliations":[{"raw_affiliation_string":"NCSU Computer Science","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109510196","display_name":"Kemafor Ogan","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kemafor Ogan","raw_affiliation_strings":["NCSU Computer Science"],"affiliations":[{"raw_affiliation_string":"NCSU Computer Science","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012385538","display_name":"Yufeng Xin","orcid":"https://orcid.org/0000-0002-1648-3575"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]},{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yufeng Xin","raw_affiliation_strings":["RENCI/UNC, Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI/UNC, Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050863093","display_name":"Ilya Baldin","orcid":"https://orcid.org/0000-0001-7158-0143"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]},{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ilya Baldin","raw_affiliation_strings":["RENCI/UNC, Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI/UNC, Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073744273"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64631744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"28","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8463283777236938},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.64041668176651},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5787079334259033},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5644140839576721},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.5641294121742249},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5296195149421692},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4770887792110443},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4716567099094391},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.46689972281455994},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44000935554504395},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.43329405784606934},{"id":"https://openalex.org/keywords/traverse","display_name":"Traverse","score":0.42702823877334595},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4238448143005371},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.14731231331825256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8463283777236938},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.64041668176651},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5787079334259033},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5644140839576721},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.5641294121742249},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5296195149421692},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4770887792110443},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4716567099094391},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.46689972281455994},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44000935554504395},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.43329405784606934},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.42702823877334595},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4238448143005371},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.14731231331825256},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netsoft.2018.8460116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8460116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W93447152","https://openalex.org/W1859590599","https://openalex.org/W1954609806","https://openalex.org/W2015715125","https://openalex.org/W2050516909","https://openalex.org/W2052569240","https://openalex.org/W2083898199","https://openalex.org/W2108732836","https://openalex.org/W2119179558","https://openalex.org/W2147118406","https://openalex.org/W2296143987","https://openalex.org/W2512254823","https://openalex.org/W2648865853","https://openalex.org/W2734434059","https://openalex.org/W2932330752","https://openalex.org/W4205148683","https://openalex.org/W4300609434","https://openalex.org/W6639086250","https://openalex.org/W6679974969","https://openalex.org/W6699070669"],"related_works":["https://openalex.org/W2377402383","https://openalex.org/W2380835401","https://openalex.org/W2381912691","https://openalex.org/W2350381577","https://openalex.org/W2353618196","https://openalex.org/W2348074676","https://openalex.org/W2385033175","https://openalex.org/W2374043190","https://openalex.org/W3046364132","https://openalex.org/W2774756485"],"abstract_inverted_index":{"The":[0],"separation":[1],"of":[2,34,61,69,93,109,131,161,172,177],"control":[3,18],"and":[4,46,52,74,139,170],"data":[5,35,144],"planes":[6],"promulgated":[7],"in":[8,82,103,124,158,163],"Software-Defined":[9],"Networking":[10],"(SDN)":[11],"architectures":[12],"provides":[13],"new":[14],"opportunities":[15],"for":[16,137,154],"sophisticated":[17],"over":[19],"the":[20,26,29,32,37,59,91,107,111,155,159,168],"paths":[21],"packets":[22],"take":[23],"while":[24],"traversing":[25],"network.":[27],"At":[28],"same":[30],"time":[31,157],"complexity":[33],"representing":[36],"network":[38,50,71,126,142],"state":[39],"continues":[40],"to":[41,58,63,76,86,121,150],"grow,":[42],"reflecting":[43],"complex":[44],"topological":[45],"policy":[47,101],"relationships":[48],"between":[49],"elements":[51],"their":[53],"domains.":[54],"It":[55],"is":[56],"critical":[57],"success":[60],"SDN":[62,104,179],"design":[64],"an":[65],"abstraction":[66,92,97],"layer":[67],"capable":[68],"storing":[70,138],"topology":[72,112],"information":[73],"allowing":[75],"query":[77],"it":[78],"using":[79,128,145],"standardized":[80],"tools,":[81],"a":[83,129,135],"way":[84],"similar":[85],"how":[87],"traditional":[88],"databases":[89],"enabled":[90],"relational":[94],"data.":[95,113],"This":[96],"would":[98],"cleanly":[99],"separate":[100],"implementations":[102],"controllers":[105],"from":[106],"nuts-and-bolts":[108],"handling":[110],"In":[114],"this":[115],"paper":[116],"we":[117],"investigate":[118],"multiple":[119],"approaches":[120],"path":[122,147],"queries":[123,173],"semantically-rich":[125],"descriptions":[127],"variety":[130],"mechanisms.":[132],"We":[133,166],"describe":[134],"method":[136],"querying":[140],"semantic":[141],"graph":[143],"Tarjan":[146],"algebras":[148],"-":[149],"our":[151],"knowledge":[152],"used":[153],"first":[156],"context":[160],"path-finding":[162],"computer":[164],"networks.":[165],"compare":[167],"expressiveness":[169],"performance":[171],"that":[174],"are":[175],"representative":[176],"multi-domain":[178],"environments.":[180]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
